45 research outputs found

    Plasma measurements with the retarding potential analyser on OGO 6

    Get PDF
    Plasma measurements with retarding potential analyzer on OGO

    Recognition of Regional Water Table Patterns for Estimating Recharge Rates in Shallow Aquifers

    Get PDF
    We propose a new method for groundwater recharge rate estimation in regions with stream-aquifer interactions, at a linear scale on the order of 10 km and more. The method is based on visual identification and quantification of classically recognized water table contour patterns. Simple quantitative analysis of these patterns can be done manually from measurements on a map, or from more complex GIS data extraction and curve fitting. Recharge rate is then estimated from the groundwater table contour parameters, streambed gradients, and aquifer transmissivity using an analytical model for groundwater flow between parallel perennial streams. Recharge estimates were obtained in three regions (areas of 1500, 2200, and 3300 km2) using available water table maps produced by different methods at different times in the area of High Plains Aquifer in Nebraska. One region is located in the largely undeveloped Nebraska Sand Hills area, while the other two regions are located at a transition zone from Sand Hills to loess-covered area and include areas where groundwater is used for irrigation. Obtained recharge rates are consistent with other independent estimates. The approach is useful and robust diagnostic tool for preliminary estimates of recharge rates, evaluation of the quality of groundwater table maps, identification of priority areas for further aquifer characterization and expansion of groundwater monitoring networks prior to using more detailed methods. Includes supplemental materials

    Cognitive engagement in the problem-based learning classroom

    Get PDF
    The objective of the present study was to examine to what extent autonomy in problem-based learning (PBL) results in cognitive engagement with the topic at hand. To that end, a short self-report instrument was devised and validated. Moreover, it was examined how cognitive engagement develops as a function of the learning process and the extent to which cognitive engagement determines subsequent levels of cognitive engagement during a one-day PBL event. Data were analyzed by means of confirmatory factor analysis, repeated measures ANOVA, and path analysis. The results showed that the new measure of situational cognitive engagement is valid and reliable. Furthermore, the results revealed that studentsā€™ cognitive engagement significantly increased as a function of the learning event. Implications of these findings for PBL are discussed

    A Conceptualization of e-Risk Perceptions and the Offline-Online Risk Trade-Off for Small Firm Internationalization

    Full text link
    A sound conceptualization of international e-risks has grown in demand, because of the increasing penetration of the Internet, and specifically the enabling-facility of the Internet technology for small firms. Yet, to date, there has been no study explicitly attempting to build an international business risk framework for the online environment, nor to explain online internationalization decisions. The purpose of the present paper is threefold, (1) to combine and complement the existing traditional international risk constructs and the emerging views on e-business risks into a comprehensive and unified international risk framework for the online context; (2) to develop propositions regarding SMEsā€™ active online internationalization decisions by drawing on Dunning's OLI framework; and (3) to explore the onlineā€“offline risk trade-off inherent in online internationalization decisions by integrating the e-risk framework into the eclectic paradigm

    An Atlas of the Sand Hills

    Get PDF
    The Sand Hills region, approximately 19,300 square miles of sand dunes stretching 265 miles across Nebraska and into South Dakota, is the largest sand-dune area in the Western Hemisphere and is one of the largest grass-stabilized dune regions in the world

    What constitutes information integrity?

    No full text
    This research focused on what constitutes information integrity as this is a problem facing companies today. Moreover, information integrity is a pillar of information security and is required in order to have a sound security management programme. However, it is acknowledged that 100% information integrity is not currently achievable due to various limitations and therefore the auditing concept of reasonable assurance is adopted. This is in line with the concept that 100% information security is not achievable and the notion that adequate security is the goal, using appropriate countermeasures. The main contribution of this article is to illustrate the importance of and provide a macro view of what constitutes information integrity. The findings are in harmony with Samuel Johnson's words (1751): 'Integrity without knowledge is weak and useless, and knowledge without integrity is dangerous and dreadful.

    INFORMATION TECHNOLOGY GOVERNANCE IN THE CONTEXT OF HIGHER EDUCATION GOVERNANCE IN SOUTH AFRICA

    No full text
    Public higher education in South Africa is governed by the Higher Education Act (Act No. 101 of 1997). Governance of public higher education in South Africa is just one element of governance practised across the entire domain of government to ensure accountability to the citizens of the country. This paper refers to four different, but related, levels of governance that span the landscape of public higher education: firstly, within the global context, secondly, in the context of the country with all of its government ministries; thirdly, the ā€œsystemā€ of education in the context of legislative governance within the public higher education sector in South Africa; and finally, the institutional governance arrangements required in terms of legislation or regulation, which will be reviewed with particular attention being given to IT governance. Further, the notion of ā€œmanagerialismā€ will be discussed to provide some structure to the context in which governance is practised. IT governance, as a subset of institutional governance, within and across the public higher education system is subsequently addressed. Finally, the current absence of IT governance oversight or reporting to the public higher education authority and mechanisms to improve governance in the sector are discussed, which provide an indication of the value that can be created by the implementation of a best practice IT governance framework at institutional level. Accordingly, an IT governance framework can be used to measure the maturity of a wide range of IT processes that The layered approach to governance investigated in this paper provides insight into the factors that influence the ability to govern subsystems, particularly the IT subsystem, in the public higher education sector in South Africa

    Absorptive Capacity and Information Technology Adoption Strategies: A Study of SMEs in Kenya

    No full text
    Many small and medium enterprises (SMEs) in developing countries continue to be challenged by their information technology (IT) adoption process, which is often characterized by a number of deficiencies. The purpose of this study was to examine the role of absorptive capacity (AC) in SMEsā€™ performance, as well as establish the correlation between SMEsā€™ AC and their IT adoption process. The findings of this study, obtained by measuring different dimensions of AC using Jimenez-Barrionuevo, Garcia-Morales, and Molinaā€™s scale of 18 items, suggest that AC plays a critical role in the performance of SMEs in Kenya and that SMEs with strong AC employed the use of more superior IT adoption processes than did their counterparts with low levels of AC. The researchers submit that, if exploited, AC has the potential to improve the IT adoption strategies of SMEs in Kenya and those of other developing countries that operate within similar environments
    corecore